Bideh et al., 2018 - Google Patents
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applicationsBideh et al., 2018
- Document ID
- 15416162746588943441
- Author
- Bideh P
- Mahdavi M
- Borujeni S
- Arasteh S
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
Recently, digital watermarking has become an important technique to preserve patients' privacy in telemedicine applications. Since, medical information are highly sensitive, security of watermarked medical images becomes a critical issue in telemedicine applications. In this …
- 238000000034 method 0 title abstract description 66
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hamidi et al. | Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform | |
Singh et al. | A new robust watermarking system in integer DCT domain | |
Singh et al. | DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection | |
Benoraira et al. | Blind image watermarking technique based on differential embedding in DWT and DCT domains | |
Cheema et al. | A novel optimized semi-blind scheme for color image watermarking | |
Tarhouni et al. | Novel and robust image watermarking for copyright protection and integrity control | |
Hurrah et al. | Embedding in medical images: an efficient scheme for authentication and tamper localization | |
Lin et al. | Protecting the content integrity of digital imagery with fidelity preservation | |
Sultan et al. | Reversible and fragile watermarking for medical images | |
Liu et al. | Robust blind image watermarking based on chaotic mixtures | |
Singh et al. | Watmif: Multimodal medical image fusion-based watermarking for telehealth applications | |
Tzeng et al. | An asymmetric subspace watermarking method for copyright protection | |
Bhatnagar et al. | Secure randomized image watermarking based on singular value decomposition | |
Begum et al. | Implementation of secured and robust DFT-based image watermark through hybridization with decomposition algorithm | |
Prathap et al. | Hybrid robust watermarking for color images | |
Hadmi et al. | A robust and secure perceptual hashing system based on a quantization step analysis | |
Zeng et al. | Blind watermarking algorithm combining NSCT, DWT, SVD, and HVS | |
Khalil et al. | Two‐Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran | |
Bideh et al. | Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications | |
Barani et al. | Image forgery detection in contourlet transform domain based on new chaotic cellular automata | |
CN113392381A (en) | Watermark generation method, watermark decoding method, storage medium, and electronic device | |
Sajeer et al. | Recent advances in transform and hybrid domain digital watermarking techniques—a survey | |
Vairaprakash et al. | A discrete Rajan transform-based robustness improvement encrypted watermark scheme backed by support vector machine | |
Chitra et al. | Spatial domain watermarking technique: an introspective study | |
Nikbakht et al. | Targeted watermark removal of a SVD-based image watermarking scheme |